Can an attacker simply freeze a chip in liquid nitrogen and dump the memory?

Yes, but that is in no way sufficient to break a White Hawk Software protected application.

Of course this sounds a little bit provocative, but we have heard this question in earnest! By the way: the solution is relatively simple: Use damage and repair aspects, so that the whole binary code is never completely in clear text in memory at any particular time.